The default configuration of the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 contains a known SSH private key, which makes it easier for remote attackers to obtain root access, and spoof alerts, via an SSH session.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/662676 - US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/AAMN-98MU7H - | |
References | () http://www.kb.cert.org/vuls/id/AAMN-98MUK2 - US Government Resource | |
References | () http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf - Vendor Advisory | |
References | () https://securityledger.com/2020/01/seven-years-later-scores-of-eas-systems-sit-un-patched-vulnerable/ - |
Information
Published : 2013-06-30 19:28
Updated : 2024-11-21 01:46
NVD link : CVE-2013-0137
Mitre link : CVE-2013-0137
CVE.ORG link : CVE-2013-0137
JSON object : View
Products Affected
monroe_electronics
- r189_one-net_eas
digital_alert_systems
- dasdec_eas
CWE
CWE-310
Cryptographic Issues